Mixed controldata-flow representation for modelling and verification of embedded systems

合集下载

对积分器线性动态范围的研究

对积分器线性动态范围的研究

对积分器线性动态范围的研究
方向乔
【期刊名称】《吉林化工学院学报》
【年(卷),期】1995(012)004
【摘要】本文利用闭环负反馈线性电路分析方法,从输入输出两方面定量透析了积分器的线性动态范围,讨论了输出要求与输入动态范围取值的关系,为使用与调试提供更充分的依据。

【总页数】4页(P43-46)
【作者】方向乔
【作者单位】无
【正文语种】中文
【中图分类】TP332
【相关文献】
1.HPLC检测器的线性动态范围及其测试方法的研究 [J], 李昌厚;孙吟秋;赵琦;王志坚
2.Clegg非线性积分器的实现与非线性典型Ⅱ型系统的构成 [J], 牛景汉;潘永生
3.光纤无线电系统的线性动态范围研究 [J], 喻佼焱;郑小平;周炳琨
4.非线性功放扩大主动磁悬浮系统动态范围研究 [J], 张燕红;赵德安;张建生
5.滤波器设计与积分器动态范围的关系 [J], 刘弘;董在望
因版权原因,仅展示原文概要,查看原文内容请购买。

采用变换域自适应技术抑制DS扩频通信中的窄带干扰

采用变换域自适应技术抑制DS扩频通信中的窄带干扰

采用变换域自适应技术抑制DS扩频通信中的窄带干扰
潘波;宋雪桦
【期刊名称】《微计算机信息》
【年(卷),期】2006(000)05X
【摘要】为了去除DS扩频系统的窄带干扰,本文提出利用调制重叠变换(MLT)把接收信号映射到变换域.然后应用变换域自适应滤波技术进行抗干扰处理,计算机仿真结果表明该算法可取得对抗干扰很大的阻带衰减,并且系统性能不随干扰频率和干扰带宽的变化而变化,而且能实时实现,本中讨论了实现时应注意的问题,可以预见MLT很有希望取代传统的块变换。

【总页数】3页(P100-102)
【作者】潘波;宋雪桦
【作者单位】江苏大学,江苏镇江212013
【正文语种】中文
【中图分类】TN914
【相关文献】
1.基于FFT的DSSS系统变换域窄带干扰抑制技术的研究 [J], 林明;胡助理;杨建伟
2.DSSS系统中基于变换域限幅LMS算法的窄带干扰抑制 [J], 张玉恒;吴启晖;王
金龙
3.采用变换域自适应技术抑制DS扩频通信中的窄带干扰 [J], 潘波;宋雪桦
4.基于加窗DFT的DSSS系统变换域窄带干扰抑制技术 [J], 张春海; 卢树军; 张尔

5.变换域自适应滤波技术在扩频通信抗窄带干扰中的应用 [J], 李冲泥;胡光锐;陈豪因版权原因,仅展示原文概要,查看原文内容请购买。

一种自适应滤波分形图像压缩方法

一种自适应滤波分形图像压缩方法

一种自适应滤波分形图像压缩方法
陈传波;黄芬;何大华
【期刊名称】《华中科技大学学报:自然科学版》
【年(卷),期】2003(31)6
【摘要】在基本分形图像压缩方法的基础上 ,结合DCT提出了一种自适应滤波分形图像压缩方法 ,该方法根据图像的能量分布调整滤波器 ,能有效地减少图像的整体匹配误差 ,提高信噪比 .实验表明。

【总页数】3页(P81-83)
【关键词】图像处理;分形;离散余弦变换;峰值信噪比;滤波器
【作者】陈传波;黄芬;何大华
【作者单位】华中科技大学计算机科学与技术学院
【正文语种】中文
【中图分类】TP391
【相关文献】
1.一种基于分块的分形图像压缩方法 [J], 唐国维;韩鹏宇;王艾;王苫社;施国俊
2.基于自适应门限四叉树的分形图像压缩新方法 [J], 张梁斌;范申
3.小波域上分形噪声的一种自适应Wiener滤波方法 [J], 李强;江巨浪
4.自适应遗传算法与分形图像压缩结合的新方法 [J], 张梁斌;周必水;奚李峰
5.基于自适应四叉树的一种分形图像压缩方法 [J], 但志平;王以治;高蓉
因版权原因,仅展示原文概要,查看原文内容请购买。

具有功能化栅电极和基电极的纳米柱场效应和结型晶体管[发明专利]

具有功能化栅电极和基电极的纳米柱场效应和结型晶体管[发明专利]

专利名称:具有功能化栅电极和基电极的纳米柱场效应和结型晶体管
专利类型:发明专利
发明人:阿迪蒂亚·拉贾戈帕,杰峰·常,奥利佛·普拉特布格,斯蒂芬·彼得里,阿克塞尔·谢勒,查尔斯·L·奇尔哈特
申请号:CN201380039616.3
申请日:20130712
公开号:CN105408740A
公开日:
20160316
专利内容由知识产权出版社提供
摘要:描述了用于分子感测的系统和方法。

描述的分子传感器基于场效应晶体管或双极结型晶体管。

这些晶体管具有带有与基电极或栅电极接触的功能化层的纳米柱。

该功能化层能够结合分子,这会在传感器中引发电信号。

申请人:加州理工学院,赛诺菲美国服务公司
地址:美国加利福尼亚州
国籍:US
代理机构:北京安信方达知识产权代理有限公司
更多信息请下载全文后查看。

UDD在消除制备簇态时次近邻相互作用中的应用

UDD在消除制备簇态时次近邻相互作用中的应用

UDD在消除制备簇态时次近邻相互作用中的应用张纪英;陈佳君;吴山;鲁望婷;陈红梅;赖重远【期刊名称】《江汉大学学报(自然科学版)》【年(卷),期】2018(046)001【摘要】在具有XY型相互作用的自旋链中,可以分两步操作制备可用于量子计算的簇态.当考虑到实际情况中不可避免的量子自旋间的次近邻相互作用时,制备的簇态的保真度会随着粒子数的增加而不断降低.研究表明,应用周期性动力学退耦合(periodic dynamical decoupling,PDD)能够有效抑制此次近邻相互作用噪声.众所周知,Uhrig动力学退耦合(Uhrig dynamical decoupling,UDD)抑制噪声的效果一般优于PDD.为了进一步抑制XY模型中的次近邻相互作用,提出应用UDD抑制次近邻相互作用的方案.研究结果表明,外加脉冲总数相同时,UDD方案制备到的簇态的保真度数值要大于之前的PDD方案,即UDD方案抑制XY模型中的次近邻相互作用的效果优于PDD方案.【总页数】5页(P31-35)【作者】张纪英;陈佳君;吴山;鲁望婷;陈红梅;赖重远【作者单位】江汉大学交叉学科研究院,湖北武汉 430056;江汉大学交叉学科研究院,湖北武汉 430056;江汉大学交叉学科研究院,湖北武汉 430056;江汉大学交叉学科研究院,湖北武汉 430056;江汉大学交叉学科研究院,湖北武汉 430056;江汉大学交叉学科研究院,湖北武汉 430056【正文语种】中文【中图分类】O431.2【相关文献】1.顺式聚乙炔中的次近邻电子相互作用 [J], 谢尊;安忠;张迎涛;李有成2.一维具有次近邻相互作用海森堡链中的量子关联 [J], 黄军林;章青袍;黄瑶瑶;范楚辉;孙哲3.增光子相干态光场与二能级原子相互作用中的含时维格纳函数 [J], 庞华锋;杨庆怡4.四方哈伯德团簇中对角跃迁和近邻库仑相互作用的物理影响 [J], 吴永政;梅聪;高云;黄忠兵;;;;5.基于团簇态和贝尔态的不对称双向远程制备 [J], 廖延娜;冯宇森;彭鑫春因版权原因,仅展示原文概要,查看原文内容请购买。

一种基于压缩感知的无冗余通道时间交织ADC随机化方法

一种基于压缩感知的无冗余通道时间交织ADC随机化方法

一种基于压缩感知的无冗余通道时间交织ADC随机化方法胡毅;王于波;李振国;姜亦刚;李靖;张帆
【期刊名称】《微电子学与计算机》
【年(卷),期】2022(39)2
【摘要】在时间交织ADC结构中,本文基于压缩感知理论提出一种无冗余通道随机化方法.利用随机数决定当前通道ADC是否采样,当有多个通道ADC空闲时随机选择某个通道进行采样,实现时间交织ADC的欠奈奎斯特随机化采样.在此基础上,基于观测矩阵和正交匹配追踪算法对时间交织ADC的数据进行重建,获得完整的ADC量化结果.通过MATLAB对本文提出的基于压缩感知的时间交织ADC通道随机化方法进行建模,在给定采样时间失配条件下,本方法将时间交织ADC的SFDR 从53.1 dB提高到65.5 dB,提升12.4 dB,有效提高了ADC的动态性能.
【总页数】6页(P101-106)
【作者】胡毅;王于波;李振国;姜亦刚;李靖;张帆
【作者单位】北京智芯微电子科技有限公司;电子科技大学;国网浙江省电力有限公司
【正文语种】中文
【中图分类】TN432
【相关文献】
1.双通道时间交织ADC采样系统的频域纠正补偿
2.基于PC软件的时间交织ADC 误差校准
3.一种速度可扩展的时间交织复位运放流水线ADC的设计
4.一种用于时
间交织型SAR ADC的电容校正技术5.超高速时间交织ADC通道失配后台校准算法
因版权原因,仅展示原文概要,查看原文内容请购买。

一种小波域平滑滤波的杂波抑制方法

一种小波域平滑滤波的杂波抑制方法

一种小波域平滑滤波的杂波抑制方法
周宁;李在铭
【期刊名称】《电子学报》
【年(卷),期】2010(038)007
【摘要】本文提出了一种小波域平滑滤波的杂波抑制方法,该方法将原始图像变换到小波域后,分别对各小波子带先作平滑、后作差分处理以最大限度地滤除背景杂波和噪声,然后再对图像进行小波逆变换,达到有效抑制背景的目的.实验结果表明,该方法处理后得到的残差图像呈现出很好的高斯性和独立性,并且目标邻域信号杂波比(SCNR)的平均增益比对图像直接平滑滤波的邻域信号杂波比(SCNR)的平均增益提高2dB左右,算法性能明显优于图像域平滑滤波的传统方法.
【总页数】5页(P1641-1645)
【作者】周宁;李在铭
【作者单位】电子科技大学通信与信息工程学院,四川成都,610054;电子科技大学通信与信息工程学院,四川成都,610054
【正文语种】中文
【中图分类】TN911.73
【相关文献】
1.基于小波域HMT的图像杂波抑制方法 [J], 赖宗英;艾斯卡尔·艾木都拉
2.基于小波域DCT变换的杂波抑制方法 [J], 周宁;李晓峰;李在铭
3.一种基于谱极化参数的双极化气象雷达杂波抑制方法 [J], 汪玲;田凤;朱岱寅;孟
凡旺;吴迪
4.一种杂波分类辅助的近海岸模糊杂波抑制方法 [J], 段崇棣;韩超垒;杨志伟;张庆君
5.一种零陷展宽的脉间捷变频雷达杂波抑制方法 [J], 赵继超;宋嘉奇
因版权原因,仅展示原文概要,查看原文内容请购买。

IEC61400-1-2005风电机组设计要求标准英汉对照

IEC61400-1-2005风电机组设计要求标准英汉对照
Consolidated editions The IEC is now publishing consolidated versions of its publications. For example, edition numbers 1.0, 1.1 and 1.2 refer, respectively, to the base publication,the base publication incorporating amendment 1 and the base publication incorporating amendments 1and 2.
需要什么文档直接在我的文档里搜索比直接在网站大海捞针要容易的多也准确省时的多
INTERNATIONAL STANrbines – Part 1:
Design requirements
Publication numbering As from 1 January 1997 all IEC publications are issued with a designation in the 60000 series. For example, IEC 34-1 is now referred to as IEC 60034-1.
Further information on IEC publications The technical content of IEC publications is kept under constant review by the IEC, thus ensuring that the content reflects current technology. Information relating to this publication, including its validity, is available in the IEC Catalogue of publications (see below) in addition to new editions, amendments and corrigenda. Information on the subjects under consideration and work in progress undertaken by the technical committee which has prepared this publication, as well as the list of publications issued,is also available from the following: IEC Web Site (www.iec.ch) Catalogue of IEC publications The on-line catalogue on the IEC web site (www.iec.ch/searchpub) enables you to search by a variety of criteria including text searches,technical committees and date of publication. Online information is also available on recently issued publications, withdrawn and replaced publications, as well as corrigenda. IEC Just Published This summary of recently issued publications (www.iec.ch/online_news/justpub) is also available by email. Please contact the Customer Service Centre (see below) for further information. Customer Service Centre If you have any questions regarding this publication or need further assistance, please contact the Customer Service Centre: Email: custserv@iec.ch Tel: +41 22 919 02 11 Fax: +41 22 919 03 00 .
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

MIXED CONTROL/DATA-FLOW REPRESENTATION FOR MODELLING AND VERIFICATION OFEMBEDDED SYSTEMSByMauricio VareaDepartment of Electronics and Computer Science,University of Southampton,United Kingdom.March2002UNIVERSITY OF SOUTHAMPTONABSTRACTFACULTY OF ENGINEERINGELECTRONICS AND COMPUTER SCIENCE DEPARTMENTMPhil/PhD Transfer ReportMixed Control/Data-Flow Representationfor Modelling and Verification of Embedded Systemsby Mauricio VareaEmbedded system design issues become critical as implementation technologies evolve. The interaction between the control and dataflow of an embedded system specification is an important consideration and,in order to cope with this aspect,a new internal design representation called Dual Flow Net(DFN)is introduced and further analysed in this thesis.One of the key features of this internal representation is its tight control and dataflow interaction,which is achieved by means of two new concepts.Firstly,the structure of the new DFN model is formulated employing a tripartite graph as basis, which turns out to be advantageous for modelling heterogeneous systems.Secondly,a complex domain marking scheme is used to describe the behaviour of the system,leading to better results in terms of modelling the dynamics of the embedded system specification. Structural definitions,behavioural rules and graphical representation of the new DFN model is presented in this work.Besides the potential application of the proposed DFN model in the realm of em-bedded system’s internal design representation,this thesis also addresses the verification of DFN models through formal methods.Behavioural properties of embedded systems, such as reachability,safety and liveness are expressed either in Computation Tree Logic (CTL)or in Linear Temporal Logic(LTL)formulae,and then verified using state-of-the-art tools.This thesis also addresses the implementation of an efficient library which undertakes the model checking problem in DFN models.Examples of varying complexity are presented in order to illustrate the feasibility and validity of the DFN model.These examples range from simple systems used to un-derstand the underlying semantics of the model,up to complex arrangements modelling real-life embedded systems.Furthermore,a number of relevant and challenging areas based on the DFN model(and its verification methodology),are outlined as future work.ContentsList of Symbols viiChapter1Introduction11.1Embedded Systems Design (1)1.1.1Modelling (3)1.1.2Validation (4)1.1.3Synthesis (6)1.2Motivation and Contributions (7)1.3Thesis Organisation (8)Chapter2Background and Related Work92.1Embedded System Modelling Techniques (9)2.1.1M CD models (10)2.1.2M DC models (11)2.1.3M¯B models (12)2.2Formal Verification of Embedded System models (12)2.2.1Temporal Logics (13)2.2.2Model Checking (13)2.2.3Automata-Theoretic Aproaches (14)2.3Concluding Remarks (14)Chapter3New Internal Design Representation:Dual Flow Nets163.1DFN structural model (17)3.1.1Structural model example (19)3.2A new concept in marking functions (20)3.3DFN behavioural model (23)3.3.1Behavioural model example (25)3.4Examples of Application (26)3.4.1Embedded Multiplier (26)Chapter4Formal Verification of the DFN model304.1Algorithms for Model Checking DFN models (30)4.2Implementation and Results (34)4.3VME-bus controller (35)Chapter5Conclusions385.1Future Work (38)Appendix A Complex Numbers40 Bibliography41List of Figures1.1Typical Embedded System Design Flow (2)1.2Relationship among Validation Methods (5)1.3Impact of Design on System Implementation Cost[100] (8)3.1The DFN philosophy (17)3.2DFN vertices interaction in both control and data domain (18)3.3A simple DFN model (20)3.4State space mapped into the complex plane (23)3.5Behavioural analysis of a DFN model (26)3.6Embedded Multiplier (27)3.7Multiplier algorithm (27)3.8DFN model of multiplier (28)4.1Our Model Checking Methodology (31)4.2Nondeterministic scheduler (31)4.3Place definition:data type (32)4.4Algorithm for a DFN Control Transition (32)4.5Algorithm for a DFN Hull (33)4.6Algorithm for a DFN Guard Function (34)4.7Verification time depending on the capacity K and the length L (35)4.8VME bus controller (36)List of Tables2.1Temporal Operators (13)List of Symbols=⇒implies⇐⇒if and only if ∈set membership ∪set union∩set intersection ∅empty set ∧logical and ∨logical or ∀for all∃there existsC /set of complex numbersi imaginary unit,i.e.√−1ℜ(ς)real part of ς∈C/ℑ(ς)imaginary part of ς∈C /|ς|modulus of ς∈C /∠ςphase of ς∈C/•x pre-set of x over the control domain ◦x pre-set of x over the data domain x •post-set of x over the control domain x ◦post-set of x over the data domainChapter1IntroductionEmbedded systems are task-specific mixed hardware/software systems which are part of a larger system.They often consist of both reactive and transformative functions which heavily interact with the environment.This functional combination makes them appli-cable to a variety offields such as mobile phones,cars,avionics,medical equipments, computer devices,consumer electronics,household appliances,etc.For instance,a mod-ern car may have up to70embedded systems[84],namely Engine Control Units(ECU), which aid in the cruise of the car(e.g.Anti-lock Braking System(ABS),fuel injection controller,electronic ignition system,etc.)Embedded system designers are facing up to the arduous reality in electronic indus-try:the customer is never satisfied.Therefore,there is an increasing design complexity while time-to-market windows are rapidly decreasing.Greater design complexities are in the aftermath of technology development,hence very likely to continue raising in the future.In addition,meeting the plummeting time-to-market imposed by the burgeon-ing technology is becoming a major challenge.Therefore,it is widely believed that the source for an overall improvement comes from the methodologies used along the design flow rather than more powerful processing engines devoted to implement the design.This thesis tackles the identification of features related to improving the designflow of embedded systems.The rest of this chapter introduces the overall embedded sys-tem designflow as well as the main objectives followed in this research.Section1.1 describes each process involved in the design of embedded systems.The main contribu-tions together with the underlying motivation of this work are highlighted in Section1.2. Finally,Section1.3concludes this chapter summarising the organisation of this thesis.1.1Embedded Systems DesignIncreasing development challenges,such as design complexity and time-to-market shrink-ing windows,are driving embedded system designers to look into the design process with the aim of optimising several design objectives simultaneously[33].The overallFigure1.1:Typical Embedded System Design Flowconstraint to these optimisation goals is the cost.However,achieving more cost-effective solutions,i.e.better performance/cost relation throughout the entire design process,does not necessarily mean that the cost is a target to optimise,it rather suggests that cost plays a ceiling role.Figure1.1shows a typical embedded system designflow.The two inputs to this sys-tematic approach are,on the one hand,the embedded system specification which contains all technology independent information and,on the other,the technology library consist-ing of a set of resources that defines the architecture to be used in the embedded system implementation.The output is thefinal implementation of the embedded system,which results from the heterogeneous integration of architectures carried out in the synthesis process.A cost-effective fulfilment of this designflow is carried out by hardware/software co-design methodologies[71,98],which reduce the time-to-market parameter by jointly designing both hardware and software components of an embedded system architecture.This state-of-the-art methodology is an elegant two-dimensional extention of the one-dimensional High Level Synthesis(HLS)methodology[40],which has gained vast ac-ceptance in both industry and academia[17,68,99].Three processes are identified in the embedded system designflow[32,71]:1.Modelling2.Validation3.SynthesisThese processes are fundamental steps in any methodology aimed to design an embed-ded system.In addition,correctness identification and estimation are intermediate steps which might be part of the methodology.However,in most cases these steps are sub-sumed by the three processes aforementioned.The following is a detailed description of each process.1.1.1ModellingWithin the designflow of embedded systems,there is an increasing number of cost-based decisions that depend on the information extracted by the modelling process.The out-come of this process,i.e.the internal design representation(IDR),is characterised by two orthogonal parameters[18]:scalability and expressiveness.Scalability is the capability to perform functional analysis of the model at different levels of complexity.One way to improve scalability indices of a model is by means of a convenient methodology that al-low representations at different levels of abstraction.Expressiveness depicts howflexible a model is,i.e.the amount of problems that can be captured by the IDR.This trade-off between scalability and expressiveness is evident in embedded systems,where the model has to be expressive enough to capture the features that influence the overall cost,but also sufficiently abstract to hide unnecessary details.The IDR not only unambiguously defines the embedded system specification,but also allows a better exploration among possible implementations of a design.Therefore, choosing an appropriate IDR facilitates the use of several tools for estimation,validation and synthesis.This requires a mechanism that precisely describes those aspects which are relevant to the specification and copes with all the interactions associated with them.With regard to the model,there are two main trends in hardware/software co-design of embedded systems[41]:When the IDR is given as textual language(L),or a graphical model of computation(MoC)based IDR.The main difference between these two trends is that thefirst one(L)tend to be most suitable for modelling systems where the organi-sation of the information is more important than the functionality,while the later(MoC) focus on such systems that priorises either functionality(states)or physical composition (architecture).However,should be noted that these trends are not mutually exclusiveand therefore it is possible to map a model from one approach to the other,i.e.either to graphically represent a language L or to put a MoC in a textual form.Despite not being well suited neither for state-oriented nor architectural purposes,tex-tual L s have gained more popularity than MoCs among synchronous embedded system designs mainly due to their ease of storage and manipulation which leads to less complex supporting tools,e.g.editors,translators and nguages such as Esterel[10] or Lustre[50]have ruled the L approach to both control-and data-dominated embedded systems respectively,taking into consideration many features of the design,e.g.con-currency,hierarchy,multi-rate clocking,etc.Furthermore,there is a well established community which considers that Hardware Description Languages(HDL)is already a standard IDR for the architecture of an embedded system.This includes languages L such as Verilog[85],VHDL[73]or SpecC[42],where the specification is given in terms of concurrent processes.On the contrary,MoCs such as StateCharts[30,51]are con-ceptually best suited for the representation of embedded system models,but suffers from being difficult to employ by the designer.Both forms of IDR,i.e.either textual or graphical based,have two well defined parts in order to undertake the statical and dynamical analysis of the embedded system,which are the structural and behavioural model.In textual L s,the interconnection of modules or entities1sets up the structure of the model while the behaviour is described in terms of a parallel or sequential execution of events.In graphical MoCs,the structural model refers to the topology of the formalism and the semantical-guided analysis of states or events brings out the behavioural model.1.1.2ValidationThrough the validation process,the designer achieves a reasonable level of confidence about how much of the original embedded system design will be in fact reflected in the final implementation.Early detection of design errors dramatically reduces the cost of design(see Figure1.3),since less reiterative work is carried out.The cost of detecting errors also increases as the designer goes further in the synthesis process.In general, there are three methods for validation:•Simulation(S)•Prototyping(P)•Formal Verification(FV)Figure1.2shows the goal of each method in terms of both behavioural coverage and structural accuracy.Based on the microeconomic theory of the consumer(MTC),where economists analyses the behaviour of rational consumers(i.e.those who intend to choose the best bundle of goods they can afford)by means of indifference curves and budget 1depending whether the syntax is defined by Verilog or VHDL language.lines[95],we infer the shape of efficiency and cost of the three methods for embedded system validation.Efficiency(referred as capacity in[100])is a trade-off between be-havioural coverage and structural accuracy,and cost is a measurement of the allocation of resources,e.g.memory,which is not necessarily reflected in the price of the tool.On the MTC theory,the indifference(hyperbolic)curves show the preference of the consumer for any combination of two products which gives him equal utility or satisfaction.The budget line illustrates alternative combination of both goods that can be purchased by the consumer given afixed income.Likewise,assuming that both coverage and accu-racy are goods(i.e.desired features),the efficiency of a validation method is given by an hyperbolic conduct while the cost is linear.Therefore,simulation(S)depicts an efficient-constant response where more accurate models can be analysed by means of a smaller the behavioural coverage.Since the actual implementation exists in prototyping(P),this method always has a maximum degree of structural accuracy,i.e.100%.Therefore,a higher coverage(hence efficiency)is only attained by increasing the cost.Finally,a maximum behavioural coverage is obtained by formal verification(FV)methods,where the accuracy(hence efficiency)can be raised by increasing the cost.Should be noted that maximum coverage at infinite accuracy is an utopian goal almost never achieved in realistic cases,due to strict cost margins.Figure1.2:Relationship among Validation MethodsWith reference to Figure1.1,either a stimulusfile or a set of properties are inputs to the validation method.The stimulus is used in when simulation methods while the set of properties are intrinsic of a formal verification method.In case of prototyping methods,an equivalent prototype of thefinal implementation has to be synthesised inorder to validate the design,which denotes a link between the validation and thefinal implementation(this is shown using a dashed line in Figure1.1).Much research has been carried out in the simulation of heterogeneous hardware/soft-ware embedded system[29,49,80,88].In contrast to simulation,which can only verify an embedded system behaviour for a particular stimulus,formal verification is capable of reasoning about properties usually expressed in temporal logics(ref.Section2.2.1)for all possible behaviours(i.e.maximum behavioural coverage).We will cover this in more depth,later in Section2.2.1.1.3SynthesisThefinal stage in the development of an embedded system is the synthesis process,which reduces the level of abstraction in the design until the desired implementation is obtained. This is equivalent to move horizontally in Figure1.2,towards maximum level of accu-racy.Within the designflow(Figure1.1),the abstract components of the IDR are combined with the technology library in order to produce an embedded systemfinal implementa-tion which meets the requirements.Merging the IDR with the technology library might sometimes take an additional architectural parameters estimation step,since the imple-mentation is not unique for a given IDR.Since the synthesis process is a knock-on effect of the IDR used,it heavily depends on the characteristics of the model.For instance, an IDR which explicitly denotes data dependencies facilitates the synthesis of hardware data path.It is important that architectural information is only added into this step of the design flow.If the specification(or the IDR)is too operational,i.e.influenced by the current technology,it will bias the design towards an architecture which might not be favourable to solve in the best way the problem formulated.The outcome of the synthesis process is afinal implementation of the embedded sys-tem,i.e.a mixed hardware/software system[1,38]serving to fulfil the specification re-quirements.This consists of a combination between standard and custom hardware.A standard hardware for an embedded system is typically made up of one or more commer-cial microprocessors(or microcontrollers),memory and interfacing units;whereas cus-tom hardware is implemented either as Application Specific Integrated Circuits(ASIC) or Field Programmable Gate Arrays(FPGA),depending on the desiredflexibility.Then, software processes are allocated to these hardware resources,providingflexibility into the embedded system implementation resulted[71,98].1.2Motivation and ContributionsAs discussed in Section1.1,the specification,internal design representation and imple-mentation of an embedded system tend to be highly heterogeneous parts in the design flow.Two different types of heterogeneity can be identified:•at the IDR level,the control and dataflow parts are unattached descriptions of the embedded system functionality which are tightly linked,and•at the implementation level,the execution of the embedded system’s task is per-formed by a mixed hardware/software architecture.This thesis concentrates on thefirst type of heterogeneity,since we strongly believe that an enhancement of the whole embedded system designflow depends more on the IDR used rather than the implementation architecture.A thorough examination in the realm of IDR for embedded systems indicates that despite the important role of modelling in the overall cost,it has not been sufficiently addressed yet.For instance,Figure1.3il-lustrates the design cost of System-on-a-Chip(SoC)technology[19]for two different assumptions:(a)no IDR used,and(b)the use of models which undergoes some success-ful paradigms such as reuse,platform-based design,hardware/software co-design,fault tolerance,intelligent testbench,etc.Thisfigure quantifies the impact of these paradigms on the design cost of low-power SoC(SOC-LP).Considering only the year2001,the cost of designing and implementing this type of embedded system equates2the sum of£10,540,200which represents an improvement of over22times w.r.t.an estimated £239,550,012without the influence of these innovational paradigms that had taken place over the last decade[100].This clearly shows the need for a better understanding of the underlying phenomena in embedded systems in order to obtain more cost-effective implementations.One of the key parameters that gives rise to this issue,is the existence of event driven mechanisms(controlflow)that curbs the operation of computationally intensive parts (dataflow).Control and dataflow cannot be analysed separately since there is a tight interaction between them.However,this interaction is not a trivial matter and it is seldom exploited by many approaches.To undertake the problem of efficiency in embedded system design,the aim of this thesis is to:1.Examine the role of modelling in the designflow and identify key features whichleads to better embedded system implementations.2.Propose a new IDR developed specifically to exploit the strong interconnectionbetween control and dataflow parts in embedded systems.2original values were published using US dollars as currency and then translated into GB pounds at the following rate:£1=$1.42942Year£ 7M19851990199520002010201520052020D e s i g n C o s t [l o g ]Figure 1.3:Impact of Design on System Implementation Cost [100]Furthermore,successful achievements of formal verification in the validation of industrial embedded system products (e.g.the verification of Futurebus+cache protocol [23]and the bug found in the Pentium Processor [25])leads up to take on this particular trend,in order to validate the IDR introduced.Therefore,an additional goal is to:3.Study verification techniques suited for the proposed model by using formal meth-ods.1.3Thesis OrganisationThe remainder of this thesis is organised as follows.Chapter 2briefly reviews some con-cepts used throughout this work,namely different forms of IDR for embedded systems and some general knowledge of formal verification.In Chapter 3a formal definition of the new DFN model is given,including structural and behavioural characteristics.This is our main attempt to achieve a well balanced mixed control/data-flow model in order to represent embedded systems.Some simple examples illustrate the applicability of the model into embedded system modelling and help to understand its semantics.A validation methodology,which is suitable for the design flow treated throughout this thesis,is introduced in Chapter 4.The chapter presents the full development and analysis of a four-module library for model checking DFN models.Also,some real-life examples provide an insight of the methodology and its mechanism.Finally,some conclusions with respect to the currently ongoing research are drawn in Chapter 5.This includes a brief outline of the future trend for the remaining of this work.Chapter2Background and Related WorkThis chapter presents an overview of the work carried out in thefield of embedded system modelling(Section2.1)and provides an introduction to the formal verification problem (Section2.2).The following two main sections survey the related work as well as bring forth an insight of the formalisms involved in both modelling and formal verification of embedded system.2.1Embedded System Modelling TechniquesModelling is the core of many disciplines in science and engineering.Either scientists or engineers have increased the insight knowledge of a physical phenomenon by represent-ing the interaction of different parameters as a model[103].For example,a well known set of equations developed by James C.Maxwell has provided to physicists an insight into the interactions between electric and magneticfields[79].The importance of modelling within the designflow of embedded systems has been discussed in Section1.1(refer to Figure1.1).Furthermore,Section1.2has argued the impact of the internal design representation used along the design on the complexity of the embedded system under development,hence its cost.It was shown that one of the main factors that influences this complexity is the control/data-flow linkage.In this section we describe some relevant formal models that have been used when describing embedded systems[66].In order to facilitate the literature reviewfindings,the models presented in this section are classified according to the following taxonomy:1.Models originally developed for control-dominated embedded system and later ex-panded to include dataflow(for ease of reference,these models are called M CD),2.Models developed in a data-dominated basis extended to support also controlflow(referred as to M DC),and3.Unbiased models developed specifically to deal with combined control/data-flowinteractions(M¯B).2.1.1M CD modelsThe development of a fundamental model for synchronous disrete-time systems was a landmark in the design of digital systems.The Finite-State Machine(FSM)model[45] has been widely used in control theory and is the foundation for the development of several internal design representations for control-dominated embedded systems.The FSM is a tuple S,I,O,f,h ,where S,I and O are the set of states,inputs and outputs respectively;f:S×I→S is the next-state function and h is the output function.FSMD Intuitively,the FSM definition given above can easily support data informa-tion just by extending each element of S,I and O from the boolean to the in-teger domain.This is,a Finite-State Machine with Datapath(FSMD)is a tuple S,V,I,O,f,h where S is the set of states,V is the set of datapath variables, I:I C×I D and O:O C×O D[39].Likewise,FSMD state transitions may include arithmetic and logic operations on the set of datapath variables.Although the num-ber of states is dramatically reduced,the state-explosion problem is still present. CFSM The Co-design Finite State Machines(CFSM)[21]is an extended asynchronous FSM that operates on a set of integer variables with arithmetic,relational and logical operators.This model is suitable for control-dominated applications of relatively low algorithmic complexity[20].For instance,the POLIS environ-ment[5,65,87]is based on the CFSM model of computation.Within this frame-work,specifications are given in a higher level language,usually ESTEREL[8–10], and the designer must manually do the partitioning and cosimulation.The later is performed by using the Ptolemy environment[13,14,86]which implements an efficient simulator for hierarchical FSM[15].Furthermore,CFSM are not only used within the POLIS framework.An attempt to develop a hardware/software co-design system which uses a statechart based tool for the specification of CFSM models instead,has been carried out in[6].This approach improves the cosimula-tion of CFSM models.The Petri net model[77]is another type of state-oriented model,which can efficiently exploit concurrency identification.A Petri net is a directed,weighted,bipartite graph PN= P,T,F,W ;where P is a set of vertices called places,T is another set of vertices (P∩T=∅)called transitions,F⊆(P×T)∪(T×P)is a set of arcs,and W:F→I N is a weight function,where a set of k arcs is represented by a single k-weighted arc[72]. However some definitions of the Petri net structure does not consider a weight function W,they rather formulate the net by means of bag theory,which allows(unlike classical sets)multiple occurrence of elements[76].The actual concept of states is associated to tokens,which inhere in places and circu-late through the net by the excecution offiring rules.High Level Petri Nets(HLPN)[54]include Predicate/Transitions Nets(PrT-Nets)[44] and Coloured Petri Nets(CPN)[55–57].Both approaches have been applied to embed-ded system modelling[46,60],but CPN has been leading the way.The following two models are prompted by CPN.CDFG The Quenya Control/Data-Flow Graph(CDFG)is a slightly modified version of the TaoDFG model which is based on CPNs[11].A Quenya CDFG is a directed graph where nodes represent data operations,control operations,comunication and miscellaneous,and edges form the control/data-flow.Edges may contain two type of tokens,which are d∈D for data-types,s∈S for value-less points of execution, or t∈T=D∪S for a combination of both.This is the kernel of the LYCOS system[67].PRES+In the Petri net based Representation for Embedded System(PRES+)model[26], tokens of the underlying PN are redefined in order to handle data information in addition to the controlflow manipulated during a classical execution of the net.PRES+has been applied to formal verification of Timed CTL(TCTL)proper-ties[3]using a transformation of PRES+into Timed Automata.Models con-structed at different levels of abstraction are possible by means of hierarchy[27].2.1.2M DC modelsThe modelling of transformational embedded systems has been primarily based on data flow graphs[28],since its suitability for scheduling.This model consists of a directed graph G=(V,E),where nodes V={ν1,ν2,···,νN},N=|V|represent computations and the arcs E⊆V×V describe the data dependency between operations,hence the processing order.FGM The Flow Graph Model(FGM)is a graph representation based on the model de-scribed above,where a polar acyclic G is used to represent sequential threads of execution[48].In this model(G),there are two particular nodesν0andνN which are source and sink operations respectively.Thus,a loop in the specification is captured by an infinite repeat count of G,i.e.the source operation is uncondition-ally called on the completion of the sink operation.The IDR consists of a set Φ={G1,G2,...,G n}of FGMs,a set of timing constraints(T)and a set of re-source constraints(R).This IDR is used in the VULCAN system[47],wherea HardwareC specification[62]is translated into FGM by a program called Her-cules[61].SPI The System Property Intervals(SPI)model consist of processes communicating through unidirectional channels,which are defined in terms of a tuple P,C,E , where P is a set of processes,C=Q∪R is a set of channels(composed of queues Q and registers R)and E=(P×C)∪(C×P)denotes a set of edges[104].The。

相关文档
最新文档